Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5175582pxj; Wed, 9 Jun 2021 10:52:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKMqHlhyQkhc84duWTl5oCvYjOoIl3A531ufx4HOtyWXxc7kRpx07VyAyPU7SX1QEVGxoe X-Received: by 2002:a17:906:c00f:: with SMTP id e15mr1039946ejz.458.1623261155065; Wed, 09 Jun 2021 10:52:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623261155; cv=none; d=google.com; s=arc-20160816; b=zs/mbXeit/EGEYcxl2TnCmA0aLpY6AUOXZmRuyOy7WQDbPwgxK4sGOdUwdS3yewSUQ /dBZA7ZEhE2sGStgt/Kmn5fh+DQ4pmfcQbXxanpPHZHFdRgfmU4lPoN5AJLGROP9HJKk PYloYjioDhbnCne3eYa2XAF3fUiNXsWsxaBLP4atLUdrrK0uW2vjVXJXtQUX8/AKwuDL YzOPzHheXMJbCaBQXI1kmYxHBVb+DzobwC/KIzuTxQpcYS0huTD4NFbVpIYn/jw4uH6X Une203PElTg3z8/0YzaqK+FX3jrIMh3iIzjpl4SBT2QQIEyfurBAcOk+EgWHJ56sIwHn gL2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=6hXyYVhaDOQdwZyFBB6OdFjWfyhqV0X5ycORaixjC5I=; b=Iw9eZbJ7uKbMt9PV9U6c16BwoWm79Xq/URd76iV7EtvNc5DF2QWQXzPkSQacJjSlvN hyJYTmoe3pEAYh6EpIPuCB7Kn494yrYQs8hh90akLGomLLrIA1udsEM+DcXfWcDiq2BX AdZLBTDqIMGWQUOIICTvkmshAw05nBu4Wrh0FxL5QW5K29+SzibgycSX+waSOeUC2Q2f Jju+eKnhXrmxxhZY0EfaD51T4t9aV8Tz0J5LdBXwPuQoCj0X8La+8xYhLCh2vDD8hQtd YIPfD1Xd4KinscHgQMNAIrzkK0LaBzpC5i9kdwi2Epi5J5PdQxjBn1vX0t7I6uJfxbPD CUDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 19si345119ejx.529.2021.06.09.10.52.10; Wed, 09 Jun 2021 10:52:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231162AbhFIOrk (ORCPT + 99 others); Wed, 9 Jun 2021 10:47:40 -0400 Received: from foss.arm.com ([217.140.110.172]:33532 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238100AbhFIOri (ORCPT ); Wed, 9 Jun 2021 10:47:38 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 86EBCD6E; Wed, 9 Jun 2021 07:45:43 -0700 (PDT) Received: from [10.57.6.115] (unknown [10.57.6.115]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B97EF3F73D; Wed, 9 Jun 2021 07:45:41 -0700 (PDT) Subject: Re: [RFC] mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk To: Neil Armstrong , Marek Szyprowski , ulf.hansson@linaro.org Cc: khilman@baylibre.com, jbrunet@baylibre.com, martin.blumenstingl@googlemail.com, linux-mmc@vger.kernel.org, linux-amlogic@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Mark Rutland , Bartlomiej Zolnierkiewicz References: <20210608153344.3813661-1-narmstrong@baylibre.com> From: Robin Murphy Message-ID: <92024ca5-c6fa-0e6a-b6ba-f35f92222e76@arm.com> Date: Wed, 9 Jun 2021 15:45:36 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-06-09 14:07, Neil Armstrong wrote: > Hi, > > On 08/06/2021 17:50, Marek Szyprowski wrote: >> Hi >> >> On 08.06.2021 17:33, Neil Armstrong wrote: >>> It has been reported that usage of memcpy() to/from an iomem mapping is invalid, >>> and and recent arm64 memcpy update [1] triggers a memory abort when dram-access-quirk >>> is used on the G12A/G12B platforms. >>> >>> This adds a local sg_copy_to_buffer which makes usage of io versions of memcpy >>> when dram-access-quirk is enabled. >>> >>> Fixes: acdc8e71d9bb ("mmc: meson-gx: add dram-access-quirk") >>> Reported-by: Marek Szyprowski >>> Suggested-by: Mark Rutland >>> Signed-off-by: Neil Armstrong >>> >>> [1] 285133040e6c ("arm64: Import latest memcpy()/memmove() implementation") >>> >>> Signed-off-by: Neil Armstrong >>> --- >>> Hi Ulf, Marek, Mark, >>> >>> I haven't tested the patch yet, but should fix issue reported at [2]. >> >> Works fine here and fixed the issue. >> >> Tested-by: Marek Szyprowski > > Thanks, I'll need to rework to pass an __iomem pointer to memcpy_to/fromio so sparse doesn't scream anymore. Hmm, might it be worth factoring out general sg_copy_{to,from}_iomem() helpers? From a quick grep I found at least mv_cesa_sg_copy() already doing essentially the same thing as meson_mmc_copy_buffer(). Robin. > > Neil > >> >>> Neil >>> >>> [2] https://lore.kernel.org/r/acb244ad-0759-5a96-c659-5c23003d3dcd@samsung.com >>> >>> drivers/mmc/host/meson-gx-mmc.c | 48 ++++++++++++++++++++++++++++++--- >>> 1 file changed, 44 insertions(+), 4 deletions(-) >>> >>> diff --git a/drivers/mmc/host/meson-gx-mmc.c b/drivers/mmc/host/meson-gx-mmc.c >>> index b8b771b643cc..89ff6038092d 100644 >>> --- a/drivers/mmc/host/meson-gx-mmc.c >>> +++ b/drivers/mmc/host/meson-gx-mmc.c >>> @@ -742,6 +742,48 @@ static void meson_mmc_desc_chain_transfer(struct mmc_host *mmc, u32 cmd_cfg) >>> writel(start, host->regs + SD_EMMC_START); >>> } >>> >>> +/* local sg copy to buffer version with _to/fromio usage for dram_access_quirk */ >>> +static void meson_mmc_copy_buffer(struct meson_host *host, struct mmc_data *data, >>> + size_t buflen, bool to_buffer) >>> +{ >>> + unsigned int sg_flags = SG_MITER_ATOMIC; >>> + struct scatterlist *sgl = data->sg; >>> + unsigned int nents = data->sg_len; >>> + struct sg_mapping_iter miter; >>> + void *buf = host->bounce_buf; >>> + unsigned int offset = 0; >>> + >>> + if (to_buffer) >>> + sg_flags |= SG_MITER_FROM_SG; >>> + else >>> + sg_flags |= SG_MITER_TO_SG; >>> + >>> + sg_miter_start(&miter, sgl, nents, sg_flags); >>> + >>> + while ((offset < buflen) && sg_miter_next(&miter)) { >>> + unsigned int len; >>> + >>> + len = min(miter.length, buflen - offset); >>> + >>> + /* When dram_access_quirk, the bounce buffer is a iomem mapping */ >>> + if (host->dram_access_quirk) { >>> + if (to_buffer) >>> + memcpy_toio(buf + offset, miter.addr, len); >>> + else >>> + memcpy_fromio(miter.addr, buf + offset, len); >>> + } else { >>> + if (to_buffer) >>> + memcpy(buf + offset, miter.addr, len); >>> + else >>> + memcpy(miter.addr, buf + offset, len); >>> + } >>> + >>> + offset += len; >>> + } >>> + >>> + sg_miter_stop(&miter); >>> +} >>> + >>> static void meson_mmc_start_cmd(struct mmc_host *mmc, struct mmc_command *cmd) >>> { >>> struct meson_host *host = mmc_priv(mmc); >>> @@ -785,8 +827,7 @@ static void meson_mmc_start_cmd(struct mmc_host *mmc, struct mmc_command *cmd) >>> if (data->flags & MMC_DATA_WRITE) { >>> cmd_cfg |= CMD_CFG_DATA_WR; >>> WARN_ON(xfer_bytes > host->bounce_buf_size); >>> - sg_copy_to_buffer(data->sg, data->sg_len, >>> - host->bounce_buf, xfer_bytes); >>> + meson_mmc_copy_buffer(host, data, xfer_bytes, true); >>> dma_wmb(); >>> } >>> >>> @@ -955,8 +996,7 @@ static irqreturn_t meson_mmc_irq_thread(int irq, void *dev_id) >>> if (meson_mmc_bounce_buf_read(data)) { >>> xfer_bytes = data->blksz * data->blocks; >>> WARN_ON(xfer_bytes > host->bounce_buf_size); >>> - sg_copy_from_buffer(data->sg, data->sg_len, >>> - host->bounce_buf, xfer_bytes); >>> + meson_mmc_copy_buffer(host, data, xfer_bytes, false); >>> } >>> >>> next_cmd = meson_mmc_get_next_command(cmd); >> >> Best regards >> > > > _______________________________________________ > linux-arm-kernel mailing list > linux-arm-kernel@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel >